Unit almost eight Answer Piece
Given the network protection applications and countermeasures in the first column of the table below, explore answers to the following concerns: * Wherever does the countermeasure belong inside the seven websites of a typical THAT infrastructure? 5. What CIA functions does the countermeasure give?
Provide your answers in the table listed below.
Network Protection Applications and Countermeasures | Domains | CIA Function | Ethical hacker | * Workstation domain | Availability
Intrusion recognition system/intrusion elimination system (IDS/IPS) | 2. System/Application website * Remote access domain name * LAN-to-WAN domain | Integrity | Access regulates | 5. LAN-to-WAN domain name * WAN domain | Confidentiality | Failover server | 2. WAN site * LAN-to-WAN domain | Availability | Automatic updates | 2. Workstation site | Supply
Cryptography | * LAN-to-WAN site | Privacy
Data backups | * System/Application domain | Availability
Logon rights | 2. LAN domain name | Sincerity
Computer system cluster | * Workstation domain | Integrity
Firewalls | * LAN domain | Confidentiality
Proxies | * LAN-to-WAN domain | Integrity Confidentiality
Anti-virus scanners | * Workstation domain | Confidentiality | As a reminder, the seven domains of a typical THIS infrastructure range from the following domain names: * End user domain: Genuine users
* Workstation website: Workstations, laptop computers, and end-point devices, such as smart phones and printers 2. LAN domain: Physical and logical LAN technologiesвЂ”100 Mbps/1000 Mbps changed Ethernet, 802. 11-family of wireless LAN technologiesвЂ”used to back up workstation connection to the company network infrastructure * LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS * WAN domain: Routers, circuits, buttons, firewalls, gateways, and equivalent gear for remote spots, sometimes under a managed assistance offering by service provider 2. Remote access domain: Virtual private networks (VPNs), notebook computers with VPN...
Tags: infrastructure, application, operating-system, ethics, domain, lan-to-wan, lan-to-wan domain, confidentiality, workstation, workstation domain, availability, site availability, website confidentiality, domain integrity, get domain, answers, app domain, virtual-private-network, computer-network